Search results for: SECURE DOMINATION NUMBER - Bridge of Knowledge

Search

Search results for: SECURE DOMINATION NUMBER

Search results for: SECURE DOMINATION NUMBER

  • Independent Domination Subdivision in Graphs

    Publication

    - GRAPHS AND COMBINATORICS - Year 2021

    A set $S$ of vertices in a graph $G$ is a dominating set if every vertex not in $S$ is adjacent to a vertex in~$S$. If, in addition, $S$ is an independent set, then $S$ is an independent dominating set. The independent domination number $i(G)$ of $G$ is the minimum cardinality of an independent dominating set in $G$. The independent domination subdivision number $\sdi(G)$ is the minimum number of edges that must be subdivided (each...

    Full text available to download

  • 2-outer-independent domination in graphs

    Publication

    We initiate the study of 2-outer-independent domination in graphs. A 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)\D has at least two neighbors in D, and the set V(G)\D is independent. The 2-outer-independent domination number of a graph G is the minimum cardinality of a 2-outer-independent dominating set of G. We show that if a graph has minimum degree at least two,...

    Full text available to download

  • Bondage number of grid graphs

    Publication

    The bondage number b(G) of a nonempty graph G is the cardinality of a smallest set of edges whose removal from G results in a graph with domination number greater than the domination number of G. Here we study the bondage number of some grid-like graphs. In this sense, we obtain some bounds or exact values of the bondage number of some strong product and direct product of two paths.

    Full text available to download

  • Global defensive secure structures

    Publication

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Full text to download in external service

  • Edge subdivision and edge multisubdivision versus some domination related parameters in generalized corona graphs

    Publication

    - Opuscula Mathematica - Year 2016

    Given a graph G= (V, E), the subdivision of an edge e=uv∈E(G) means the substitution of the edge e by a vertex x and the new edges ux and xv. The domination subdivision number of a graph G is the minimum number of edges of G which must be subdivided (where each edge can be subdivided at most once) in order to increase the domination number. Also, the domination multisubdivision number of G is the minimum number of subdivisions...

    Full text available to download

  • Approaching Secure Industrial Control Systems

    Publication

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Full text available to download

  • Unicyclic graphs with equal total and total outer-connected domination numbers

    Publication

    - ARS COMBINATORIA - Year 2015

    Let G = (V,E) be a graph without an isolated vertex. A set D ⊆ V (G) is a total dominating set if D is dominating and the in- duced subgraph G[D] does not contain an isolated vertex. The total domination number of G is the minimum cardinality of a total domi- nating set of G. A set D ⊆ V (G) is a total outer–connected dominating set if D is total dominating and the induced subgraph G[V (G)−D] is a connected graph. The total outer–connected...

    Full text to download in external service

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Full text to download in external service

  • Weakly convex and convex domination numbers of some products of graphs

    If $G=(V,E)$ is a simple connected graph and $a,b\in V$, then a shortest $(a-b)$ path is called a $(u-v)$-{\it geodesic}. A set $X\subseteq V$ is called {\it weakly convex} in $G$ if for every two vertices $a,b\in X$ exists $(a-b)$- geodesic whose all vertices belong to $X$. A set $X$ is {\it convex} in $G$ if for every $a,b\in X$ all vertices from every $(a-b)$-geodesic belong to $X$. The {\it weakly convex domination number}...

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Full text to download in external service

  • Cops, a fast robber and defensive domination on interval graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Full text available to download

  • Bipartite theory of graphs: outer-independent domination

    Publication

    - NATIONAL ACADEMY SCIENCE LETTERS-INDIA - Year 2015

    Let $G = (V,E)$ be a bipartite graph with partite sets $X$ and $Y$. Two vertices of $X$ are $X$-adjacent if they have a common neighbor in $Y$, and they are $X$-independent otherwise. A subset $D \subseteq X$ is an $X$-outer-independent dominating set of $G$ if every vertex of $X \setminus D$ has an $X$-neighbor in $D$, and all vertices of $X \setminus D$ are pairwise $X$-independent. The $X$-outer-independent domination number...

    Full text to download in external service

  • Domination-Related Parameters in Rooted Product Graphs

    Abstract A set S of vertices of a graph G is a dominating set in G if every vertex outside of S is adjacent to at least one vertex belonging to S. A domination parameter of G is related to those sets of vertices of a graph satisfying some domination property together with other conditions on the vertices of G. Here, we investigate several domination-related parameters in rooted product graphs.

    Full text to download in external service

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Weakly connected Roman domination in graphs

    Publication

    A Roman dominating function on a graph G=(V,E) is defined to be a function f :V → {0,1,2} satisfying the condition that every vertex u for which f(u) = 0 is adjacent to at least one vertex v for which f(v)=2. A dominating set D⊆V is a weakly connected dominating set of G if the graph (V,E∩(D×V)) is connected. We define a weakly connected Roman dominating function on a graph G to be a Roman dominating function such that the set...

    Full text available to download

  • Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange

    Publication

    The Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...

    Full text available to download

  • Interpolation properties of domination parameters of a graph

    An integer-valued graph function π is an interpolating function if a set π(T(G))={π(T): T∈TT(G)} consists of consecutive integers, where TT(G) is the set of all spanning trees of a connected graph G. We consider the interpolation properties of domination related parameters.

    Full text to download in external service

  • Experimental Extraction of Secure Correlations from a Noisy Private State

    Publication
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - PHYSICAL REVIEW LETTERS - Year 2011

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...

    Full text available to download

  • W-like bound entangled states and secure key distillation

    Publication

    We construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...

    Full text to download in external service

  • Edge-Computing based Secure E-learning Platforms

    Publication

    - Year 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Full text available to download

  • Relations between the domination parameters and the chromatic index of a graph

    In this paper we show bounds for the sum and the product of the domination parameters and the chromatic index of a graph. We alsopresent some families of graphs for which these bounds are achieved.

    Full text available to download

  • Paired domination and doubly domination in graphs

    Publication

    - Year 2007

    W rozprawie poruszane są zagadnienia związane z dominowaniem parami w grafach oraz domiowaniem totalno - powściągniętym w grafach. Ponadto omawiane są zagadnienia związane ze złożonością obliczeniową różnych problemów dominowania w grafach.

  • Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities

    Publication

    - Year 2022

    In relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...

    Full text available to download

  • The concept of smart and secure laboratory.

    Publication

    - Year 2004

    W chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...

  • Decision making process using deep learning

    Publication

    - Year 2019

    Endüstri 4.0, dördüncü endüstri devrimi veya Endüstriyel Nesnelerin İnterneti (IIoT) olarak adlandırılan sanayi akımı, işletmelere, daha verimli, daha büyük bir esneklikle, daha güvenli ve daha çevre dostu bir şekilde üretim yapma imkanı sunmaktadır. Nesnelerin İnterneti ile bağlantılı yeni teknoloji ve hizmetler birçok endüstriyel uygulamada devrim niteliği taşımaktadır. Fabrikalardaki otomasyon, tahminleyici bakım (PdM – Predictive...

  • 2-Coloring number revisited

    2-Coloring number is a parameter, which is often used in the literature to bound the game chromatic number and other related parameters. However, this parameter has not been precisely studied before. In this paper we aim to fill this gap. In particular we show that the approximation of the game chromatic number by the 2-coloring number can be very poor for many graphs. Additionally we prove that the 2-coloring number may grow...

    Full text available to download

  • Bounds on isolated scattering number

    Publication

    The isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.

    Full text to download in external service

  • Bounds on isolated scattering number

    Publication

    - Year 2021

    The isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.

    Full text to download in external service

  • Navier number and transition to turbulence

    Publication

    The motivation behind this article is to explain a role of the Navier number (Na -dimensionless slip-length) in prediction of closures for laminar to turbulent transition undergoing via eddies detachment from the slip layer in nano-cannals. Additionally the role of the Navier number Na in universal modeling of phenomenon of enhanced mass flow rate reported in micro- and nano-channels has been explained. The Na number should be...

    Full text available to download

  • Graphs with equal domination and 2-distance domination numbers

    W publikacji scharakteryzowane są wszystkie te drzewa i grafy jednocykliczne, w których liczba dominowania oraz liczba 2-dominowania na odległość są sobie równe.

    Full text available to download

  • A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise

    Publication

    Without a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publication
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Year 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Full text available to download

  • Secure key from bound entanglement

    Publication

    - Year 2005

    Scharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.

  • Trees with equal restrained domination and total restrained domination numbers

    W publikacji scharakteryzowano wszystkie drzewa, w których liczby dominowania powściągniętego oraz podwójnie totalnego są sobie równe.

    Full text available to download

  • Quantum strategies for rendezvous and domination tasks on graphs with mobile agents

    Publication

    - PHYSICAL REVIEW A - Year 2024

    This paper explores the application of quantum nonlocality, a renowned and unique phenomenon acknowledged as a valuable resource. Focusing on an alternative application, we demonstrate its quantum advantage for mobile agents engaged in specific distributed tasks without communication. The research addresses the significant challenge of rendezvous on graphs and introduces a distributed task for mobile agents grounded in the graph...

    Full text available to download

  • The conception of secure and efficient process of migration into IPv6

    Ze względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...

  • Research in Number Theory

    Journals

    ISSN: 2522-0160 , eISSN: 2363-9555

  • Algebra & Number Theory

    Journals

    ISSN: 1937-0652 , eISSN: 1944-7833

  • JOURNAL OF NUMBER THEORY

    Journals

    ISSN: 0022-314X , eISSN: 1096-1658

  • IEEE Transactions on Dependable and Secure Computing

    Journals

    ISSN: 1545-5971 , eISSN: 1941-0018

  • The limit case of a domination property

    Publication

    - ACTA MATHEMATICA SINICA-ENGLISH SERIES - Year 2012

    Praca dotyczy dolnego ograniczenia liczby dominowania w grafach, ze względu na ilość wierzchołków oraz największą liczbę liści w drzewie spinającym.

    Full text to download in external service

  • Graphs with isolation number equal to one third of the order

    Publication

    - DISCRETE MATHEMATICS - Year 2024

    A set D of vertices of a graph G is isolating if the set of vertices not in D and with no neighbor in D is independent. The isolation number of G, denoted by \iota(G) , is the minimum cardinality of an isolating set of G. It is known that \iota(G) \leq n/3 , if G is a connected graph of order n, , distinct from C_5 . The main result of this work is the characterisation of unicyclic and block graphs of order n with isolating number...

    Full text to download in external service

  • T-colorings, divisibility and circular chromatic number

    Let T be a T-set, i.e., a finite set of nonnegative integers satisfying 0 ∈ T, and G be a graph. In the paper we study relations between the T-edge spans espT (G) and espd⊙T (G), where d is a positive integer and d ⊙ T = {0 ≤ t ≤ d (max T + 1): d |t ⇒ t/d ∈ T} . We show that espd⊙T (G) = d espT (G) − r, where r, 0 ≤ r ≤ d − 1, is an integer that depends on T and G. Next we focus on the case T = {0} and show that espd⊙{0} (G) =...

    Full text available to download

  • On the independence number of some strong products of cycle-powers

    In the paper we give some theoretical and computational results on the third strong power of cycle-powers, for example, we have found the independence numbers alpha((C^2_10)^⊠3) = 30 and alpha((C^4 _14)^⊠3) = 14. A number of optimizations have been introduced to improve the running time of our exhaustive algorithm used to establish the independence number of the third strong power of cycle-powers. Moreover, our results establish...

    Full text available to download

  • Comparison of the Efficiency of Turbo Codes with Mechanisms of Reducing the Number of Iterations

    The paper presents the construction of encoders and decoders turbo codes with different number of states. Simulation results of the transmission quality of the turbo codes were presented. Decoders for turbo codes have worked with a fixed number of iterations and with the mechanisms reducing the number of iterations. Data were transmitted in Outdoor to Indoor & Pedestrian B environment for data rate 384 kbps. The SOVA algorithm...

  • Entanglement and Nonlocality are Inequivalent for Any Number of Parties

    Publication

    - PHYSICAL REVIEW LETTERS - Year 2015

    Understanding the relation between nonlocality and entanglement is one of the fundamental problems in quantum physics. In the bipartite case, it is known that these two phenomena are inequivalent, as there exist entangled states of two parties that do not violate any Bell inequality. However, except for a single example of an entangled three-qubit state that has a local model, almost nothing is known about such a relation in multipartite...

    Full text to download in external service

  • Quantum states representing perfectly secure bits are always distillable

    Publication

    W pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...

    Full text available to download

  • Secure transmission of visual image in the VTS system using fingerprinting

    Publication

    Full text available to download

  • Total restrained domination numbers of trees

    Publication

    Opisane są wszystkie drzewa, w których liczby dominowania totalnego i totalno - powściągniętego są sobie równe, a także podano dolne ograniczenie na liczbę dominowania totalno - powściągniętego w drzewach.

    Full text to download in external service

  • Distance paired domination numbers of graphs

    Publication

    W pracy przedstawione są pewne własności liczb k-dominowania parami w grafach. Wykazane jest, że problem decyzyjny liczby k-dominowania parami jest problemem NP-zupełnym nawet dla grafów dwudzielnych. Przedstawione są ograniczenia górne i dolne dla liczby k-dominowania parami w drzewach i scharakteryzowane drzewa, w których te ograniczenia są osiągnięte.

    Full text to download in external service